Login / Signup
Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy.
Ata Turk
Mayank Varia
Georgios Kellaris
Published in:
CoRR (2017)
Keyphrases
</>
user privacy
privacy preservation
privacy preserving
cloud computing
identity management
malicious users
access control
private information
data privacy
training set
data sets
data mining
location based services
social networks
association rules
sensitive information